Denial-of-Service

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to … [Read more...]

Rewrite and Redirect

Most rewrite and redirect attacks are directed against the HOSTS file(s) on infected machines. The HOSTS file is used by an operating system (not just … [Read more...]

Buffer Overflow

A buffer is an area of computer memory set aside for data. Many buffers are fixed length. The proper procedure for inserting data into a buffer is to … [Read more...]

Botnet

Using Trojan Horse programs or worms/viruses, a person (often called a "botmaster" or "herder") can inject malware into a user's computer which opens … [Read more...]

Dr Solomon History

Narrative histories are available from several sources. The information in this section was provided by and used with permission of Dr. Solomon … [Read more...]

1986-1987 The Prologue

It all started in 1986. Basit and Amjad realised that the boot sector of a floppy diskette contained executable code, and this code is run whenever … [Read more...]

1988 The Game Begins

The year 1988 was fairly quiet, as far as virus writing went. Mostly, it was the year that anti-virus vendors started appearing, making a fuss about … [Read more...]

1989 Datacrime

During 1989 things really started to move. The Fu Manchu virus (a modification of Jerusalem) was sent anonymously to a virus researcher in the UK, and … [Read more...]

1990 The Game Gets More Complex

By 1990, it was no longer a matter of running a couple of dozen search strings down each file. Mark Washburn had taken the Vienna virus, and created … [Read more...]

1991 Product Launches and Polymorphism

In 1991, the virus problem was sufficiently interesting to attract the large marketing companies. Symantec launched Norton Anti-Virus in December … [Read more...]